Update to 21.08.8 to fix CVE-2022-29500, CVE-2022-29501, and CVE-2022-29502. https://www.schedmd.com/news.php?id=260#OPT_260
Archive for May 17th, 2022
patchlevel 4927 Security fixes for CVE-2022-1616, CVE-2022-1619, CVE-2022-1619, CVE-2022-1621, CVE-2022-1629
At the end of 2021 we ran a screening survey among our customers and asked them for feedback on features delivered in 2021, as well as for those planned for 2022. We received more than 600 responses, and we would like to share the results with you. In this blog article we are going to tell you what features delivered in 2021 our customers liked best, what features are most desired by our customers, and also provide a sneak peek of our roadmap for 2022. Survey audience More than 77% of the responses are from customers who are experienced Plesk…
The post Plesk Obsidian 2021 Survey Results appeared first on Plesk.
WordPress 6.0 Release Candidate 3 (RC3) Now Available for Testing
WordPress 6.0 Release Candidate 3 is now available for testing! You can download and help test RC3 in three ways. 6.0 is planned for general release on May 24, 2022.
Several security issues were fixed in ClamAV.
Debian: DSA-5138-1: waitress security update
It was discovered that the Waitress WSGI server was susceptible to HTTP request smuggling in some scenarios when used behind a proxy. For the oldstable distribution (buster), this problem has been fixed
Debian: DSA-5139-1: openssl security update
Elison Niven discovered that the c_rehash script included in OpenSSL did not sanitise shell meta characters which could result in the execution of arbitrary commands.
Several security issues were fixed in PCRE.
Several security issues were fixed in Apport.
needrestart could be made to run programs.
Debian: DSA-5137-1: needrestart security update
Jakub Wilk discovered a local privilege escalation in needrestart, a utility to check which daemons need to be restarted after library upgrades. Regular expressions to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate
OpenLDAP could be made to perform arbitrary modifications to the database.